{"id":19542,"date":"2026-04-26T07:59:53","date_gmt":"2026-04-26T07:59:53","guid":{"rendered":"https:\/\/cryptoted.net\/index.php\/2026\/04\/26\/litecoin-rewrites-chain-history-after-privacy-exploit\/"},"modified":"2026-04-26T07:59:53","modified_gmt":"2026-04-26T07:59:53","slug":"litecoin-rewrites-chain-history-after-privacy-exploit","status":"publish","type":"post","link":"https:\/\/cryptoted.net\/index.php\/2026\/04\/26\/litecoin-rewrites-chain-history-after-privacy-exploit\/","title":{"rendered":"Litecoin rewrites chain history after privacy exploit"},"content":{"rendered":"<p> <br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/crypto.news\/app\/uploads\/2024\/02\/crypto-news-Litecoin-option05.webp\" \/><\/p>\n<div>\n<p><strong>Litecoin suffered a deep chain reorganization on Saturday after attackers exploited a zero-day bug tied to its MimbleWimble Extension Block privacy layer, according to the Litecoin Foundation.<\/strong><\/p>\n<div id=\"cn-block-summary-block_67bb4858ad52cbed824c09654c495135\" class=\"cn-block-summary\">\n<p>\n        <span class=\"tabs__item is-selected\">Summary<\/span>\n    <\/p>\n<div class=\"cn-block-summary__content\">\n<ul class=\"wp-block-list\">\n<li>Litecoin reversed 13 blocks after attackers exploited a zero-day bug in its MWEB privacy layer.<\/li>\n<li>Attackers used the fork window to attempt double-spends against several cross-chain swap protocols.<\/li>\n<li>The Litecoin Foundation said the bug has been patched, while some venues reported losses.<\/li>\n<\/ul><\/div>\n<\/div>\n<p><!-- .cn-block-summary --><\/p>\n<p>The Foundation <a href=\"https:\/\/x.com\/litecoin\/status\/2048135554445832542?s=20\" target=\"_blank\" rel=\"nofollow\">said<\/a> the bug allowed older mining nodes to accept an invalid MWEB transaction. This created a fork that lasted more than three hours before the network restored the main chain.<\/p>\n<p>    <!-- .cn-block-related-link --><\/p>\n<h2 class=\"wp-block-heading\"><strong>Invalid transactions erased from chain history<\/strong><\/h2>\n<p>The incident affected blocks 3,095,930 to 3,095,943, <a href=\"https:\/\/x.com\/AlexAuroraDev\/status\/2048087271262318795?s=20\" target=\"_blank\" rel=\"nofollow\">according<\/a> to Aurora Labs CEO Alex Shevchenko. He described the event as a \u201ccoordinated attack\u201d in a post on X.<\/p>\n<p>A 13-block reorganization removed the invalid transactions from Litecoin\u2019s main history. The Foundation said valid transactions made during that period remained unaffected.<\/p>\n<p>Moreover, attackers used the fork window to attempt double-spend transactions against cross-chain swap protocols. These platforms had accepted MWEB peg-outs that later became invalid after the reorganization.<\/p>\n<p>Shevchenko <a href=\"https:\/\/x.com\/AlexAuroraDev\/status\/2048099904938029159?s=20\" target=\"_blank\" rel=\"nofollow\">said<\/a>, \u201cThe exposure for NEAR Intents is around $600k.\u201d He also warned trading venues to review Litecoin transactions and balances, adding, \u201cWe see a lot of double spend transactions.\u201d<\/p>\n<h2 class=\"wp-block-heading\"><strong>Foundation says bug is patched<\/strong><\/h2>\n<p>The <a href=\"https:\/\/crypto.news\/event\/litecoin-summit-amsterdam-2026\/\" target=\"_blank\">Litecoin<\/a> Foundation said the zero-day bug has now been fully patched. It did not name the affected mining pools or disclose how much LTC the invalid transactions attempted to create.<\/p>\n<p>The attack marks the first known major exploit targeting MWEB since Litecoin activated the privacy feature in May 2022. <a href=\"https:\/\/crypto.news\/whats-surging-friday-bitcoin-litecoin-lead-crypto\/\" target=\"_blank\">LTC<\/a> traded near $56 after the disclosure, down about 1% on the day.<\/p>\n<p>    <!-- .cn-block-related-link --><\/p><\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/crypto.news\/litecoin-rewrites-chain-history-after-privacy-exploit\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Litecoin suffered a deep chain reorganization on Saturday after attackers exploited a zero-day bug tied to its MimbleWimble Extension Block privacy layer, according to the Litecoin Foundation. Summary Litecoin reversed 13 blocks after attackers exploited a zero-day bug in its MWEB privacy layer. Attackers used the fork window to attempt double-spends against several cross-chain swap [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":19543,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"tdm_status":"","tdm_grid_status":"","footnotes":""},"categories":[23],"tags":[],"kronos_expire_date":[],"class_list":["post-19542","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-crypto"],"_links":{"self":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/posts\/19542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/comments?post=19542"}],"version-history":[{"count":0,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/posts\/19542\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/media\/19543"}],"wp:attachment":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/media?parent=19542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/categories?post=19542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/tags?post=19542"},{"taxonomy":"kronos_expire_date","embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/kronos_expire_date?post=19542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}